CVE-2022-44313 PicoC 3.2.2 had an exploitable buffer overflow in the ExpressionCoerceUnsignedInteger function that could lead to remote code execution.

This can be exploited by attackers to execute arbitrary code as the user running the script.

The following PoC is available on GitHub. To install PicoC, run ‘pip install picoC’ on Linux or ‘git clone https://github.com/picoCMS/picoC.git’ on Windows. To run the PoC, open a terminal and run ‘picoC -V’. Download the vulnerable version of PicoC from here and run it by executing ‘picoC -V’.   On Windows, download the self-extracting EXE from here and run it by executing ‘picoC.exe -V’. On Linux, download the .tar.gz file from here and run it by executing ‘picoC.tar.gz -V’. If a previous installation of PicoC was not removed properly, it will be still installed in the system and the PoC will work.
It’s recommended to upgrade the PicoC version in a vulnerable system. If the system is currently not vulnerable, then reboot the system to allow the upgrade process to complete. PicoC is a free and open-source CMS. It’s recommended to upgrade the CMS to the latest version.  To upgrade PicoC, run ‘pip install picoC --upgrade’ or ‘git

PicoC Source Code##

A vulnerability in PicoC, a web-based content management system (CMS), has been discovered that can be exploited by attackers to execute arbitrary code as the user running the script.
The following PoC is available on GitHub. To install PicoC, run ‘pip install picoC’ on Linux or ‘git clone https://github.com/picoCMS/picoC.git’ on Windows. To run the PoC, open a terminal and run ‘picoC -V’. Download the vulnerable version of PicoC from here and run it by executing ‘picoC -V’.   On Windows, download the self-extracting EXE from here and run it by executing ‘picoC.exe -V’. On Linux, download the .tar.gz file from here and run it by executing ‘picoC.tar.gz -V’. If a previous installation of PicoC was not removed properly, it will be still installed in the system and the PoC will work. It's recommended to upgrade the PicoC version in a vulnerable system to prevent any possible future vulnerabilities from being exploited again in this way or through cross-site scripting (XSS) vulnerabilities that may exist in other outdated versions of PicoP that are still installed on your website(s).

Timeline

Published on: 11/08/2022 15:15:00 UTC
Last modified on: 11/08/2022 21:56:00 UTC

References